扫描报告
15 /100
browser-agent
浏览器自动化 Agent 技能,基于 Chrome DevTools Protocol (CDP) 和 WebSocket 实现 AI 对浏览器的直接控制
A legitimate browser automation skill using Chrome DevTools Protocol with all functionality documented. No malicious behavior detected; only local connections to localhost CDP endpoints.
可以安装
Approve for use. Consider pinning dependency versions more strictly for production deployments.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Dependency versions not strictly pinned 供应链 | scripts/requirements.txt:2 |
| 低危 | package.json also uses flexible version ranges 供应链 | package.json:33 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 浏览器 | READ | READ | ✓ 一致 | CDP WebSocket connections for browser control |
| 文件系统 | WRITE | WRITE | ✓ 一致 | browser_agent.py:121 - writes screenshots to disk |
| 网络访问 | READ | READ | ✓ 一致 | browser_agent.py:64-70 - localhost HTTP/WebSocket only |
| 命令执行 | NONE | NONE | — | No shell execution observed |
| 环境变量 | NONE | NONE | — | No environment variable access detected |
4 项发现
中危 外部 URL 外部 URL
https://chromedevtools.github.io/devtools-protocol/ README.md:190 中危 外部 URL 外部 URL
https://websocket-client.readthedocs.io/ README.md:191 中危 外部 URL 外部 URL
https://www.iana.org/help/example-domains 测试报告.md:138 中危 外部 URL 外部 URL
http://127.0.0.1:18800 测试报告.md:170 目录结构
9 文件 · 38.7 KB · 1425 行 Markdown 5f · 869L
Python 2f · 491L
JSON 1f · 55L
Text 1f · 10L
├─
▾
references
│ └─
api_reference.md
Markdown
├─
▾
scripts
│ ├─
browser_agent.py
Python
│ ├─
requirements.txt
Text
│ └─
session_manager.py
Python
├─
package.json
JSON
├─
README.md
Markdown
├─
SKILL.md
Markdown
├─
封装总结.md
Markdown
└─
测试报告.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
websocket-client | >=1.6.0 | pip | 否 | Version not pinned |
requests | >=2.31.0 | pip | 否 | Version not pinned |
安全亮点
✓ All functionality explicitly declared in SKILL.md
✓ No credential harvesting or exfiltration detected
✓ Only local network connections (localhost:18800/9222) - no external IP communication
✓ No obfuscation, base64 execution, or suspicious encoding patterns
✓ No hidden functionality beyond documented features
✓ JavaScript evaluation (Runtime.evaluate) is standard browser automation, properly documented
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No reverse shell, C2, or data theft patterns observed
✓ Clean code with no anti-analysis techniques